{"id":"RLSA-2024:8729","summary":"Moderate: firefox security update","details":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nSecurity Fix(es):\n\n* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)\n\n* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)\n\n* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)\n\n* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)\n\n* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)\n\n* firefox: thunderbird: Clipboard \"paste\" button persisted across tabs (CVE-2024-10465)\n\n* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)\n\n* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)\n\n* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)\n\n* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-05T12:15:08.074992Z","published":"2024-11-08T15:56:47.559546Z","upstream":["CVE-2024-10458","CVE-2024-10459","CVE-2024-10460","CVE-2024-10461","CVE-2024-10462","CVE-2024-10463","CVE-2024-10464","CVE-2024-10465","CVE-2024-10466","CVE-2024-10467"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:8729"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322428"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322429"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322433"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322434"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322438"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322439"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322444"}],"affected":[{"package":{"name":"firefox","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/firefox?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:128.4.0-1.el8_10"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:8729.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}